Research Journal of Information Technology最新文献

筛选
英文 中文
Determinants of Geographic Information Technologies Intention and Adoption and Mozambique Institutions’ Perspectives 地理信息技术意图和采用的决定因素和莫桑比克机构的观点
Research Journal of Information Technology Pub Date : 2017-03-15 DOI: 10.3923/RJIT.2017.64.73
Nelson Amade, M. Painho, Tiago Oliveira
{"title":"Determinants of Geographic Information Technologies Intention and Adoption and Mozambique Institutions’ Perspectives","authors":"Nelson Amade, M. Painho, Tiago Oliveira","doi":"10.3923/RJIT.2017.64.73","DOIUrl":"https://doi.org/10.3923/RJIT.2017.64.73","url":null,"abstract":"Amade, N., Painho, M., & Oliveira, T. (2017). Determinants of Geographic Information Technologies Intention and Adoption and Mozambique Institutions’ Perspectives. Research Journal of Information Technology, 2(9), 64-73. DOI: 10.3923/rjit.2017.64.73","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127082078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Inbuilt Image Encryption and Steganography Security Solutions for Wireless Systems: A Survey 无线系统的内置图像加密和隐写安全解决方案:综述
Research Journal of Information Technology Pub Date : 2017-03-15 DOI: 10.3923/RJIT.2017.46.63
P. Praveenkum, K. Thenmozhi, John Bosco Bala, R. Amirtharaj
{"title":"Inbuilt Image Encryption and Steganography Security Solutions for Wireless Systems: A Survey","authors":"P. Praveenkum, K. Thenmozhi, John Bosco Bala, R. Amirtharaj","doi":"10.3923/RJIT.2017.46.63","DOIUrl":"https://doi.org/10.3923/RJIT.2017.46.63","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127516634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Revolving of Pixels and Bits in Pixels-Plan (E) Tary Encryption 像素计划(E)加密中像素和位的旋转
Research Journal of Information Technology Pub Date : 2016-12-15 DOI: 10.3923/RJIT.2017.25.31
R. Anushiadev, P. Praveenkum, John Bosco Bala, R. Amirtharaj
{"title":"Revolving of Pixels and Bits in Pixels-Plan (E) Tary Encryption","authors":"R. Anushiadev, P. Praveenkum, John Bosco Bala, R. Amirtharaj","doi":"10.3923/RJIT.2017.25.31","DOIUrl":"https://doi.org/10.3923/RJIT.2017.25.31","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133903276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient Implementation of Pseudo Random Numbers 伪随机数的高效实现
Research Journal of Information Technology Pub Date : 2016-12-15 DOI: 10.3923/RJIT.2017.32.37
E. Kumari, Bharath Kompelli, Reshma Kalicheti, Naga Saride, K. Elleithy, L. Almazaydeh
{"title":"Efficient Implementation of Pseudo Random Numbers","authors":"E. Kumari, Bharath Kompelli, Reshma Kalicheti, Naga Saride, K. Elleithy, L. Almazaydeh","doi":"10.3923/RJIT.2017.32.37","DOIUrl":"https://doi.org/10.3923/RJIT.2017.32.37","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129919664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Photographic Experts Group Image Compression using Revised Run Length Encoding 联合摄影专家组图像压缩使用修订的运行长度编码
Research Journal of Information Technology Pub Date : 2016-12-15 DOI: 10.3923/RJIT.2017.38.45
F. Alsaade, Mahaboob Shaik
{"title":"Joint Photographic Experts Group Image Compression using Revised Run Length Encoding","authors":"F. Alsaade, Mahaboob Shaik","doi":"10.3923/RJIT.2017.38.45","DOIUrl":"https://doi.org/10.3923/RJIT.2017.38.45","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126388159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model of Textual Data Linking and Clustering in Relational Databases 关系型数据库中文本数据链接与聚类模型
Research Journal of Information Technology Pub Date : 2016-12-15 DOI: 10.3923/RJIT.2017.7.17
Wael M.S. Yafoo
{"title":"Model of Textual Data Linking and Clustering in Relational Databases","authors":"Wael M.S. Yafoo","doi":"10.3923/RJIT.2017.7.17","DOIUrl":"https://doi.org/10.3923/RJIT.2017.7.17","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115439593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Advances in Intrusion Detection Algorithms for Secure E-business Using Artificial Intelligence 基于人工智能的安全电子商务入侵检测算法研究进展
Research Journal of Information Technology Pub Date : 2016-12-15 DOI: 10.3923/RJIT.2017.1.6
Hiren K. Mewada, Sanjay Patel
{"title":"Advances in Intrusion Detection Algorithms for Secure E-business Using Artificial Intelligence","authors":"Hiren K. Mewada, Sanjay Patel","doi":"10.3923/RJIT.2017.1.6","DOIUrl":"https://doi.org/10.3923/RJIT.2017.1.6","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132432221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Calling of Garbage Collector to Decrease Memory Leaks Based on Methods Ranking 基于方法排序的垃圾回收器自适应调用减少内存泄漏
Research Journal of Information Technology Pub Date : 2016-12-15 DOI: 10.3923/RJIT.2017.18.24
M. S. Farag, O. M. Hassan
{"title":"Adaptive Calling of Garbage Collector to Decrease Memory Leaks Based on Methods Ranking","authors":"M. S. Farag, O. M. Hassan","doi":"10.3923/RJIT.2017.18.24","DOIUrl":"https://doi.org/10.3923/RJIT.2017.18.24","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"80 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123143624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Value of Release Management in the Journey of Information Technology Delivery Aligning to Business Requirements 发布管理在信息技术交付与业务需求对接过程中的价值
Research Journal of Information Technology Pub Date : 2016-11-05 DOI: 10.19026/rjit.7.3054
C. Prasad, A.Chandramohan, John Hatter
{"title":"The Value of Release Management in the Journey of Information Technology Delivery Aligning to Business Requirements","authors":"C. Prasad, A.Chandramohan, John Hatter","doi":"10.19026/rjit.7.3054","DOIUrl":"https://doi.org/10.19026/rjit.7.3054","url":null,"abstract":"Over the years, Information technology has become the backbone of businesses to the point, where it would be impossible for many to function (let alone succeed) without it. As a result of its increasing role in the enterprise, the Information Technology function is changing, morphing from a technology provider into a Strategic partner. In every organization, the application and portfolios are becoming increasingly interconnected and dependent on one other, when one is changed-the risk is high for a detrimental impact to the end user services provided by another application. And also, within the Information technology the development and operation teams that deliver and support the mixture of heterogeneous technology applications are distributed, increasingly outsourced to technology partners and the complexity is growing. The aim of the research is to address the raising challenges between business requirement and Information technology i.e., development and operations-the need for release management is crucial. Release Management acts as a bridge between development and operation teams and responsible for driving the release train from planning to deployment ensuring high quality on-schedule releases meeting the business demand. This study explains in detail about the effectively setting up the enterprise release management function and a survey about the importance of release function by interviewing the Information Technology experts around the globe and it is understood that Release management acts as a coordinator to improve the collaboration between disparate team through the strong policies, process and governance. This study also describes the benefits realized through the implementation of a formal release management discipline in major Canada based agriculture financial institution, which improved the quality of its IT release delivery.","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128499413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tasks Scheduling in Cloud Computing Environment using Workflowsim 基于Workflowsim的云计算环境任务调度
Research Journal of Information Technology Pub Date : 2016-09-15 DOI: 10.3923/RJIT.2016.98.104
P. Rawat, Priti Dimri, G. P. Saroha
{"title":"Tasks Scheduling in Cloud Computing Environment using Workflowsim","authors":"P. Rawat, Priti Dimri, G. P. Saroha","doi":"10.3923/RJIT.2016.98.104","DOIUrl":"https://doi.org/10.3923/RJIT.2016.98.104","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116107979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信